General

  • Target

    2024-04-28_9cb1b0dd8b44241413451e83b40c3212_bkransomware

  • Size

    172KB

  • Sample

    240428-ndhbysed79

  • MD5

    9cb1b0dd8b44241413451e83b40c3212

  • SHA1

    0e8beb2869a13609d63a5477c837099203fe0add

  • SHA256

    0792288d6aed4971033116d17e36eea58ed0070c131e997ce6ead89595ed7221

  • SHA512

    980554acfad05980412db522c87eddd9d5e9b388defd611b191c1439e3928cf47392467e5642cbbc9d4b60682f26a8ecfc870d337d35771937d40098b453d05b

  • SSDEEP

    3072:ZhpAyazIlyazTK+erII0nMsQg3otWuIKDuhxSFmZNfa:hZMazG+6IIEY9ILho3

Malware Config

Targets

    • Target

      2024-04-28_9cb1b0dd8b44241413451e83b40c3212_bkransomware

    • Size

      172KB

    • MD5

      9cb1b0dd8b44241413451e83b40c3212

    • SHA1

      0e8beb2869a13609d63a5477c837099203fe0add

    • SHA256

      0792288d6aed4971033116d17e36eea58ed0070c131e997ce6ead89595ed7221

    • SHA512

      980554acfad05980412db522c87eddd9d5e9b388defd611b191c1439e3928cf47392467e5642cbbc9d4b60682f26a8ecfc870d337d35771937d40098b453d05b

    • SSDEEP

      3072:ZhpAyazIlyazTK+erII0nMsQg3otWuIKDuhxSFmZNfa:hZMazG+6IIEY9ILho3

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks